Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
In the early morning hours of February 5, a group of armed men – some dressed in Pakistani police uniforms – appeared at Kareem Khan’s home, awoke him and his family at gunpoint, and took him away in an unmarked vehicle. Khan was hooded, shackled around the wrists and ankles, and driven for hours, eventually arriving at a building where he was thrown into a windowless holding cell. There he stayed for more than a week, during which he was subjected to sensory deprivation and physical abuse. Khan says he was repeatedly beaten on the soles of his feet and threatened with death by his captors. He was kept hooded and shackled for most of the day, and fed only dry bread and water. Khan has no doubts about why he was targeted. He is the first person to attempt a legal challenge to the CIA drone program in Pakistan, after his son and brother were killed in a drone strike near his home in North Waziristan on December 31st 2009. His abduction and detention occurred just over a week before Khan was to travel with [his Pakistani lawyer, Shahzad] Akbar and Jennifer Gibson, a lawyer with the UK-based legal charity Reprieve, to speak with European parliamentarians about the CIA drone program. Among the topics of discussion were the extralegal nature of the program, as well as covert intelligence sharing by European spy agencies. While in captivity, Khan was interrogated by men who refused to identify themselves, and who questioned him repeatedly about his plans to speak with the media and about the cases of others who had been killed by drones. Since the start of the “War on Terror” it has been estimated by local human rights groups that as many as 8,000 Pakistani citizens have been “disappeared” by local intelligence agencies, often at the behest of their American counterparts.
Note: The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. For more on the atrocities committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.
One person's freedom fighter may be another's terrorist, but David Miranda is very clearly neither. Yet he was detained at Heathrow airport for nine hours under schedule 7 of the Terrorism Act 2000. That the high court has now found his detention to be lawful is disappointing, to say the least. If someone travelling as part of journalistic work can be lawfully detained like this – questioned for hours without a lawyer present, his electronic equipment confiscated and cloned and all without the merest suspicion of wrongdoing required – then clearly something has gone wrong with the law. Schedule 7 suffers the same glaring flaws as the old section 44 counter-terrorism power that also allowed stop and search without suspicion. Such laws leave themselves wide open to discriminatory misuse: section 44 never once led to a terrorism conviction but was used to stop people like journalist Pennie Quinton. In a significant victory, Liberty took her case to the European court of human rights and the power was declared unlawful. Liberty and other organisations intervened in [Miranda's] case on just this point, arguing that the detention violated article 10 of the European convention, the right to freedom of expression. Our riled security services' transparent intimidation and interference with Miranda is shocking. But it's also important that we use his case to shed light on the murky everyday reality of schedule 7.
Note: For more on threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Less than two weeks after the 2011 raid that killed Osama bin Laden, a top Pentagon official ordered all photos of bin Laden's corpse be destroyed or turned over to the CIA. In an e-mail dated May 13, 2011, Adm. William McRaven, the U.S. Special Operations commander, wrote: "One particular item that I want to emphasize is photos; particularly UBLs remains. At this point — all photos should have been turned over to the CIA; if you still have them destroy them immediately or get them to the (redacted)." Shortly after the raid in Pakistan, President Obama said he would not authorize the release of any images of the al-Qaeda leader's body. Days before the order to destroy the photos, watchdog group Judicial Watch and the Associated Press had separately filed a Freedom of Information Act request for photos, videos and documents regarding bin Laden during the raid. Typically, when a Freedom of Information Act request is filed to a government agency under the Federal Records Act, the agency is obliged to preserve the material sought — even if the agency later denies the request.
Note: Why would a top military commander order all photos of bin Laden's dead body destroyed? Why would Obama prevent the release of any images of the body? For powerful evidence that the dead body was not, in fact, bin Laden's, click here and here. For other solid evidence that the official story of 9/11 is riddles with holes, see our 9/11 Information Center available here.
In the years after the end of WWII, CIA and US intelligence operatives tested LSD and other interrogation techniques on captured Soviet spies—all with the help of former Nazi doctors. It was 1946. The Joint Chiefs of Staff were preparing for ‘total war’ with the Soviets. They even set an estimated start date of 1952. U.S. military officers had been capturing and then hiring Hitler’s weapons makers in a Top Secret program that would become known as Operation Paperclip. Soon, more than 1,600 of these men and their families would be living the American dream, right here in the United States. In 1948, Operation Paperclip’s Brigadier General Charles E. Loucks ... was working with Hitler’s former chemists when one of the scientists [shared] information about a drug with military potential ... LSD. Documents obtained through the Freedom of Information Act (FOIA) reveal that the U.S. developed its post-war enhanced interrogation techniques ... under the CIA code name Operation Bluebird. The CIA teamed up with the Army Chemical Corps at Camp Detrick, in Maryland, to conduct further research and development on the chemistry of mind-altering drugs. One [Detrick agent was] Dr. Frank Olson, a former army officer and bacteriologist turned agency operative whose sudden demise—by covert LSD poisoning—in 1953 would nearly bring down the CIA. In one of the rare, surviving official documents from the program, Deputy Director of Central Intelligence Allen Dulles sent a secret memo to Richard Helms: “In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities.”
Note: To read excerpts from incredibly revealing declassified CIA documents on these programs, click here. For more on secret government mind control programs which have had a powerful hidden influence on global politics, see our Mind Control Information Center available here.
James Clapper is very worried. It's not the first time. Last week the man who serves as America's Director of National Intelligence [told] assembled members of the Senate Select Intelligence Committee that the annual worldwide threat assessment ... has filled him with dread. Last year he appeared before Congress for a similar purpose. He was very, very concerned then too. [And the same] in 2012. Of course, one must consider the possibility that over the past five decades the world has never been as dangerous, complex and challenging as it's been over the past three years, [even though the] whole "threat of nuclear holocaust" ... defined much of the 60s, 70s and 80s. Clapper's alarmist tone is hardly matched by the threats he cites. Significantly more Americans die each year from falling furniture [than from terrorist acts]. To listen to Clapper and others in the intelligence community one might never know that inter-state war has largely disappeared and that wars in general are in the midst of a multi-decade decline. 2013 was a landmark year for non-proliferation with important progress made in slowing down Iran's nuclear aspirations and enforcing the norm on chemical weapons usage. There are real threats to the US, but Clapper should be able to talk about them in sober, evidence-based, non-hysterical terms. It's almost as if Clapper and the intelligence community that he helms are playing up foreign threats in order to justify bloated post-9/11 budgets. [Remember that] he allegedly lied to Congress over the extent to which the National Security Agency was collecting phone and e-mail records of individual Americans. [Sadly,] threat mongering and exaggeration is the norm rather than the exception.
Note: For a dramatic BBC documentary showing how many politicians literally promote fear for their own self benefit, watch Power of Nightmares at this link. For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.
Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.
The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: US lawyers. A top-secret document, obtained by former NSA contractor Edward J. Snowden, shows that a US law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance of Americans ensnared by the eavesdroppers and is of particular interest because US lawyers with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. The NSA’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the US law firm, and offered to share information. The NSA is banned from targeting Americans, including businesses, law firms, and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the NSA does not use spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada, and New Zealand — to skirt the law. The Australians told officials at an NSA liaison office in Canberra, that “information covered by attorney-client privilege may be included” in the intelligence gathering. Most attorney-client conversations do not get special protections under US law from NSA eavesdropping.
Note: For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.
Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.
British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Last month, Sonoma Saveurs [restaurant] was spray-painted and flooded by vandals because of a delicacy that will appear on its menu and in its store: foie gras, the fat-engorged liver of force-fed ducks and geese. Connoisseurs consider foie gras the epitome of culinary civilization. But animal rights activists who claimed responsibility for the destruction ... call foie gras the ''delicacy of despair,'' born of cruelty to animals. The Federal Bureau of Investigation called the attacks here acts of ''domestic terrorism.'' With its associations of gastronomic elitism -- foie gras retails for around $20 to $25 a quarter-pound -- its production has long been high on the hit list of animal protectionists. Israel, the world's fourth-largest supplier of goose foie gras, recently banned the force-feeding of geese and ducks, as have Denmark, Norway, Poland, Austria and Germany, all after pressure by animal rights activists. Switzerland and the United Kingdom now discourage its production, said Paul Waldau, a clinical assistant professor at the Center for Animals and Public Policy at Tufts University. Organizations like In Defense of Animals and People for the Ethical Treatment of Animals contend force-feeding is inherently inhumane. ''Migratory fat bears no resemblance whatsoever to ramming a pipe down ducks' necks, pumping pounds of corn mash down their gullets and distending their livers,'' said Ingrid Newkirk, the president of PETA. ''These geese and ducks can't fly up the garden path, let alone migrate.''
Note: For a more recent article on how those taking action to defend ducks have been officially labelled terrorists, click here. For a six-minute video showing the incredible cruelty being inflicted on these animals, click here.
The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.
Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.
In early 2003, two senior CIA officers arrived at the U.S. Embassy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The Americans and Poles then sealed an agreement that over the previous weeks had allowed the CIA the use of a secret prison — a remote villa in the Polish lake district — to interrogate al-Qaeda suspects. The Polish intelligence service received the money, and the CIA had a solid location for its newest covert operation, according to former agency officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the CIA’s “black sites,” or secret prisons. The CIA prison in Poland was arguably the most important of all the black sites created by the agency after the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. In December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally. “In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law,” said Amrit Singh, a lawyer with the Open Society Justice Initiative.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
[Thirteen] days before that dark day in Dallas, [police informant Willie Augustus] Somersett elicited a chilling, police tape-recorded threat from a right-wing racist who talked of how the President would soon be shot “from an office building with a high-powered rifle” and how “they’ll pick up somebody within hours after…just to throw the public off.” Extremist Joseph A. Milteer, of Quitman, Ga., made the threat against Kennedy in the kitchen of Somersett’s small apartment in downtown Miami. In the late 1970s, the House Assassinations Committee had experts analyze a photograph taken in Dealey Plaza moments before the first shot of an unidentified motorcade spectator “who bears a strong resemblance” to Milteer. The experts, however, concluded the man was not Milteer, who died in 1974. But now, a retired FBI agent who says that within hours of the assassination he was assigned to locate Milteer has [said] the man in the photograph is indeed Milteer. “I stood next to the man. I interviewed him and spent hours with him,” said Don Adams, who spent 20 years with the FBI before working as a police chief in Ohio. “There is no question in my mind. As soon as I saw that picture I almost fell off of my feet.” Congressional investigators never contacted Adams. Adams, now 82, says he saw the Dealey Plaza photograph for the first time a decade after his 1982 retirement from the FBI. The photograph renewed his interest in the case and ultimately led him to write the book, From an Office Building with a High-Powered Rifle. His insider’s account raises disturbing questions about the FBI’s investigation of Kennedy’s death.
Note: To watch a five-minute video of 20-year FBI agent Don Adams stating he has no doubt there was a major cover-up of the JFK assassination, click here. For more excellent, revealing videos on the assassination, click here and here. For more on the JFK assassination, see the deeply revealing reports from reliable major media sources available here.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.